// For flags

CVE-2024-39531

Junos OS Evolved: ACX 7000 Series: Protocol specific DDoS configuration affects other protocols

Severity Score

8.7
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

An Improper Handling of Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows a network-based, unauthenticated attacker to cause a Denial-of-Service (DoS).

If a value is configured for DDoS bandwidth or burst parameters for any protocol in
a queue, all protocols which share the same queue will have
their bandwidth or burst value changed to the new value. If, for example, OSPF was configured with a certain bandwidth value, ISIS would also be limited to this value. So inadvertently either the control plane is open for a high level of specific traffic which was supposed to be limited to a lower value, or the limit for a certain protocol is so low that chances to succeed with a volumetric DoS attack are significantly increased. 




This issue affects Junos OS Evolved on ACX 7000 Series:



* All versions before 21.4R3-S7-EVO,
* 22.1 versions before 22.1R3-S6-EVO, 
* 22.2 versions before 22.2R3-S3-EVO,
* 22.3 versions before 22.3R3-S3-EVO, 
* 22.4 versions before 22.4R3-S2-EVO,
* 23.2 versions before 23.2R2-EVO,
* 23.4

versions

before 23.4R1-S1-EVO, 23.4R2-EVO.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
High
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-06-25 CVE Reserved
  • 2024-07-11 CVE Published
  • 2024-07-12 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-229: Improper Handling of Values
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
< 21.4R3-S7-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " < 21.4R3-S7-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.1 < 22.1R3-S6-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.1 < 22.1R3-S6-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.2 < 22.2R3-S3-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.2 < 22.2R3-S3-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.3 < 22.3R3-S3-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.3 < 22.3R3-S3-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 22.4 < 22.4R3-S2-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 22.4 < 22.4R3-S2-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 23.2 < 23.2R2-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 23.2 < 23.2R2-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 23.4 < 23.4R1-S1-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 23.4 < 23.4R1-S1-EVO"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS Evolved
Search vendor "Juniper Networks" for product "Junos OS Evolved"
>= 23.4 < 23.4R2-EVO
Search vendor "Juniper Networks" for product "Junos OS Evolved" and version " >= 23.4 < 23.4R2-EVO"
en
Affected